Skip to content

Commit 2408ff7

Browse files
committed
Security initiative: managed ids
1 parent c79f639 commit 2408ff7

File tree

1 file changed

+29
-29
lines changed

1 file changed

+29
-29
lines changed

AKS-Hybrid/container-storage-interface-files.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Container Storage Interface (CSI) file drivers in AKS enabled by Azur
33
description: Learn how to use Container Storage Interface (CSI) drivers to manage files in AKS Arc.
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 01/12/2024
6+
ms.date: 08/20/2024
77
ms.author: sethm
88
ms.lastreviewed: 01/14/2022
99
ms.reviewer: abha
@@ -33,46 +33,46 @@ If multiple nodes need concurrent access to the same storage volumes in AKS Arc,
3333

3434
1. Make sure the SMB driver is deployed. The SMB CSI driver is installed by default when you create a Kubernetes cluster using the Azure portal or the `az aksarc create` command. If you create a Kubernetes cluster by using `--disable-smb-driver`, you must enable the SMB driver on this cluster using the `az aksarc update` command:
3535

36-
```azurecli
37-
az aksarc update -n $aksclustername -g $resource_group --enable-smb-driver
38-
```
36+
```azurecli
37+
az aksarc update -n $aksclustername -g $resource_group --enable-smb-driver
38+
```
3939

4040
### [AKS on Azure Stack HCI 22H2 and Windows Server](#tab/22H2)
4141

4242
1. Make sure the SMB driver is deployed. Deploy the driver using the following [Install-AksHciCsiSmb](./reference/ps/install-akshcicsismb.md) PowerShell command:
4343

44-
```powershell
45-
Install-AksHciCsiSmb -clusterName mycluster
46-
```
44+
```powershell
45+
Install-AksHciCsiSmb -clusterName mycluster
46+
```
4747

4848
---
4949

50-
2. Create Kubernetes secrets to store the credentials required to access SMB shares by running the following command:
50+
1. Create Kubernetes secrets to store the credentials required to access SMB shares by running the following command:
5151

5252
```console
5353
kubectl create secret generic smbcreds --from-literal username=$username --from-literal password=$password --from-literal domain=$domain
5454
```
5555

56-
3. Create a storage class using `kubectl` to create a new SMB storage class with the following manifest:
57-
58-
```yaml
59-
apiVersion: storage.k8s.io/v1
60-
kind: StorageClass
61-
metadata:
62-
name: smb-csi
63-
provisioner: smb.csi.akshci.com
64-
parameters:
65-
source: \\smb-server\share
66-
csi.storage.k8s.io/node-stage-secret-name: "smbcreds"
67-
csi.storage.k8s.io/node-stage-secret-namespace: "default"
68-
reclaimPolicy: Retain # only Retain is supported
69-
volumeBindingMode: Immediate
70-
mountOptions:
71-
- dir_mode=0777
72-
- file_mode=0777
73-
- uid=1001
74-
- gid=1001
75-
```
56+
1. Create a storage class using `kubectl` to create a new SMB storage class with the following manifest:
57+
58+
```yaml
59+
apiVersion: storage.k8s.io/v1
60+
kind: StorageClass
61+
metadata:
62+
name: smb-csi
63+
provisioner: smb.csi.akshci.com
64+
parameters:
65+
source: \\smb-server\share
66+
csi.storage.k8s.io/node-stage-secret-name: "smbcreds"
67+
csi.storage.k8s.io/node-stage-secret-namespace: "default"
68+
reclaimPolicy: Retain # only Retain is supported
69+
volumeBindingMode: Immediate
70+
mountOptions:
71+
- dir_mode=0777
72+
- file_mode=0777
73+
- uid=1001
74+
- gid=1001
75+
```
7676
7777
### Use NFS drivers
7878
@@ -94,7 +94,7 @@ If multiple nodes need concurrent access to the same storage volumes in AKS Arc,
9494

9595
---
9696

97-
2. Create an NFS storage class using the following manifest:
97+
1. Create an NFS storage class using the following manifest:
9898

9999
```yaml
100100
apiVersion: storage.k8s.io/v1

0 commit comments

Comments
 (0)